News

Roblox is accused of secretly tracking the data of children without consent, an activity that the plaintiffs say violates their privacy under federal law.
Depending on who’s doing the talking, the new European Vulnerability Database (EUVD), set up by the European Union Agency for Cybersecurity (ENISA) and which recently went operational, is a ...
In this episode, we explore Mark Zuckerberg’s bold claim that AI friends will replace human friendships, and discuss the potential implications of a world where technology mediates our connections. We ...
Management is Key in Data Protection Strategies? With cyber threats escalating at an alarming rate, Non-Human Identities (NHIs) management has become an indispensable part of comprehensive security ...
Essential Considerations for Securing Cloud Infrastructure Have you ever paused to consider the potential vulnerabilities lurking in your cloud security? With businesses increasingly shift their ...
Why is Risk Management Essential in Cybersecurity? Do you understand the critical role risk management plays in your organization’s cybersecurity framework? It is paramount for organizations to ...
How Can Advanced IAM Empower Operational Freedom? Have you ever wondered how to achieve operational freedom in rising cyber threats and complex cloud environments? The answer lies in adopting an ...
What’s on the minds of top local government chief information security officers? In this interview, Michael Dent shares ...
Orca Security this week revealed it has acquired Opus to gain access to technologies capable of orchestrating artificial ...
How did a $400 million data breach happen at Coinbase? It wasn't a tech failure—it was a human one. Learn how social engineering exploited trust and what it means for cybersecurity.
Why is NHI Management Integral to Your Cybersecurity Strategy? If you’ve ever wondered, “How can I make my cybersecurity strategy more robust and reduce the risk of security breaches?” then Non-Human ...
The SOC has long been the enterprise’s first line of defense. But despite years of investment in threat feeds and automation ...